General
-
Target
489a08f890366aa554ec45fdea5f51ef79728ef030c5e83b119ad65655c79749
-
Size
727KB
-
Sample
220729-at9jgsdcbk
-
MD5
9a8ba26ff48ee22159d183e283208b5e
-
SHA1
fb8d4634d3e5db17c594dd210f8459d2f45c15a5
-
SHA256
489a08f890366aa554ec45fdea5f51ef79728ef030c5e83b119ad65655c79749
-
SHA512
76fa6273e860973a544c941f785b884a46864bb384ff1c87b4abc9e303a60be4239a77c0d935a66bacf8d7dba6e807509b9d321dd954de87f1b0212c799cded2
Static task
static1
Behavioral task
behavioral1
Sample
489a08f890366aa554ec45fdea5f51ef79728ef030c5e83b119ad65655c79749.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
azorult
http://208.67.105.161/kendrick/index.php
Targets
-
-
Target
489a08f890366aa554ec45fdea5f51ef79728ef030c5e83b119ad65655c79749
-
Size
727KB
-
MD5
9a8ba26ff48ee22159d183e283208b5e
-
SHA1
fb8d4634d3e5db17c594dd210f8459d2f45c15a5
-
SHA256
489a08f890366aa554ec45fdea5f51ef79728ef030c5e83b119ad65655c79749
-
SHA512
76fa6273e860973a544c941f785b884a46864bb384ff1c87b4abc9e303a60be4239a77c0d935a66bacf8d7dba6e807509b9d321dd954de87f1b0212c799cded2
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-